• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,060
Next 10 →

Towards an axiomatization of statistical privacy and utility

by Daniel Kifer, Bing-rong Lin - In PODS , 2010
"... “Privacy ” and “utility ” are words that frequently appear in the literature on statistical privacy. But what do these words really mean? In recent years, many problems with intuitive notions of privacy and utility have been uncovered. Thus more formal notions of privacy and utility, which are amena ..."
Abstract - Cited by 25 (10 self) - Add to MetaCart
“Privacy ” and “utility ” are words that frequently appear in the literature on statistical privacy. But what do these words really mean? In recent years, many problems with intuitive notions of privacy and utility have been uncovered. Thus more formal notions of privacy and utility, which

AN AXIOMATIC VIEW OF STATISTICAL PRIVACY AND UTILITY

by Daniel Kifer, Bing-rong Lin
"... Abstract. “Privacy ” and “utility ” are words that frequently appear in the literature on statistical privacy. But what do these words really mean? In recent years, many problems with intuitive notions of privacy and utility have been uncovered. Thus more formal notions of privacy and utility, which ..."
Abstract - Cited by 12 (6 self) - Add to MetaCart
Abstract. “Privacy ” and “utility ” are words that frequently appear in the literature on statistical privacy. But what do these words really mean? In recent years, many problems with intuitive notions of privacy and utility have been uncovered. Thus more formal notions of privacy and utility

Calibrating noise to sensitivity in private data analysis

by Cynthia Dwork, Frank Mcsherry, Kobbi Nissim, Adam Smith - In Proceedings of the 3rd Theory of Cryptography Conference , 2006
"... Abstract. We continue a line of research initiated in [10, 11] on privacypreserving statistical databases. Consider a trusted server that holds a database of sensitive information. Given a query function f mapping databases to reals, the so-called true answer is the result of applying f to the datab ..."
Abstract - Cited by 649 (60 self) - Add to MetaCart
obtain separation results showing the increased value of interactive sanitization mechanisms over non-interactive. 1 Introduction We continue a line of research initiated in [10, 11] on privacy in statistical data-bases. A statistic is a quantity computed from a sample. Intuitively, if the database is a

Data Security

by Dorothy E. Denning, Peter J. Denning , 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract - Cited by 615 (3 self) - Add to MetaCart
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system

Information Preservation in Statistical Privacy and Bayesian Estimation of Unattributed Histograms

by Bing-rong Lin, Daniel Kifer
"... In statistical privacy, utility refers to two concepts: information preservation – how much statistical information is retained by a sanitizing algorithm, and usability – how (and with how much difficulty) does one extract this information to build statistical models, answer queries, etc. Some scena ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
In statistical privacy, utility refers to two concepts: information preservation – how much statistical information is retained by a sanitizing algorithm, and usability – how (and with how much difficulty) does one extract this information to build statistical models, answer queries, etc. Some

Revealing information while preserving privacy

by Irit Dinur, Kobbi Nissim - In PODS , 2003
"... We examine the tradeoff between privacy and usability of statistical databases. We model a statistical database by an n-bit string d1,.., dn, with a query being a subset q ⊆ [n] to be answered by � i∈q di. Our main result is a polynomial reconstruction algorithm of data from noisy (perturbed) subset ..."
Abstract - Cited by 272 (9 self) - Add to MetaCart
We examine the tradeoff between privacy and usability of statistical databases. We model a statistical database by an n-bit string d1,.., dn, with a query being a subset q ⊆ [n] to be answered by � i∈q di. Our main result is a polynomial reconstruction algorithm of data from noisy (perturbed

Mitigating Storage Side Channels Using Statistical Privacy Mechanisms

by Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang
"... A storage side channel occurs when an adversary accesses data objects influenced by another, victim computation and infers information about the victim that it is not permitted to learn directly. We bring advances in privacy for statisti-cal databases to bear on storage side-channel defense, and spe ..."
Abstract - Add to MetaCart
A storage side channel occurs when an adversary accesses data objects influenced by another, victim computation and infers information about the victim that it is not permitted to learn directly. We bring advances in privacy for statisti-cal databases to bear on storage side-channel defense

Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression

by Pierangela Samarati, Latanya Sweeney , 1998
"... Today's globally networked society places great demand on the dissemination and sharing of person-specific data. Situations where aggregate statistical information was once the reporting norm now rely heavily on the transfer of microscopically detailed transaction and encounter information. Thi ..."
Abstract - Cited by 315 (1 self) - Add to MetaCart
Today's globally networked society places great demand on the dissemination and sharing of person-specific data. Situations where aggregate statistical information was once the reporting norm now rely heavily on the transfer of microscopically detailed transaction and encounter information

Practical privacy: the sulq framework

by Avrim Blum, Cynthia Dwork, Frank Mcsherry, Kobbi Nissim - In PODS ’05: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , 2005
"... We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database entries. In such a database, a query consists of a pair (S, f) where S is a set of rows in the database and f is a function mapping ..."
Abstract - Cited by 223 (35 self) - Add to MetaCart
We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database entries. In such a database, a query consists of a pair (S, f) where S is a set of rows in the database and f is a function mapping

Collaborative filtering with privacy via factor analysis

by John Canny - In Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval , 2002
"... Collaborative filtering is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today’s systems use centralized databases and have several disadvantages, including privacy risks. As we move toward ubiquitous computing, there is a great potential for individuals to ..."
Abstract - Cited by 210 (9 self) - Add to MetaCart
data. Our experiments on several test datasets show that the algorithm is more accurate than previously reported methods, and the improvements increase with the sparseness of the dataset. Finally, factor analysis with privacy is applicable to other kinds of statistical analyses of survey
Next 10 →
Results 1 - 10 of 1,060
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University